Technology is Not a Substitute for Good Business Processes | Microbyte

Technology is Not a Substitute for Good Business Processes

robot touches human hand

With all the readily available news, it’s important that we never advocate spreading undue concerns or raising anxiety with no justification. But, given the unprecedented rise in hacking and phishing attempts globally in 2018, we feel compelled to draw as much attention as possible to good business practices.

Many of you will have received emails prompting you to click links, sign in here and send money, etc., and you are no doubt always vigilant. However, people will continue to get “caught out” and these risks will increase over the coming months/years.

As an IT company, from a technology perspective we are continuously improving our offerings, and doing what we can to keep our networks secure. Multi-factor Authentication and Identity Protection Services are just two examples which are available and we are of course actively encouraging uptake of these.

As important as the technology, however, are the processes which govern their use (or should). It’s vitally important we all work regularly on our own internal processes to control the flow of data within our businesses.

How can I spot these bad practices?

Some very specific examples where we have seen (what we would perceive as) a lack of validation and controls might be:

  • In-depth phone conversations (and email) with individuals imitating genuine employees, suppliers or customers
  • Large payments made to bank accounts without enough verification as to the destination
  • Attempts to change to details held on record pertaining to individuals working for a company
  • Very few checks in place prior to agreeing to change bank account details and sending funds elsewhere
  • No multiple signoffs for large BACS payments, either verbal or written

These are just some examples where we need to evaluate, with surgical precision, who is allowed to do what within our businesses, where our liabilities lie, and how we double and triple check absolutely anything which potentially has a big risk attached.

As an example of progress, banks are stepping up efforts to provide more secure platforms and verification which is evident all around us. However there will never be enough, and the battle against fraudsters will be eternal. The fact you can still send funds to anywhere, with nothing more than a few numbers, and not even a company name that matches speaks volumes.

The time will come when we will be unable to blame the systems for not protecting us, and more good old-fashioned checklists might just have to make a comeback.

 

 

 

 

 

 

Similar blogs

Improve Your IT Helpdesk With SOPs

Improve Your IT Helpdesk With SOPs

As technology continues to drive businesses around the world, the role of IT helpdesks has evolved into a pivotal force, serving as the central point for user support and technical issue resolution. With organisations increasingly reliant on intricate digital infrastructures, the efficiency of IT helpdesks becomes paramount in ensuring seamless operations. Enter Standard Operating Procedures…

Read More

Avatar photo

A guide to switching IT Support Provider

A guide to switching IT Support Provider

The relationship between a business and its IT support company is a close one. With IT at the centre of almost every business, responsible for daily operations, goals, plans, feedback, data storage and communication, the right IT partner can be the driving force behind a company’s success. But as your business evolves, it’s essential to…

Read More

Avatar photo

Why should you outsource your IT Support

Why should you outsource your IT Support

When it comes to IT and technology, almost all businesses around the world rely on digital systems every single day. From cloud computing and cyber security to artificial intelligence and data analytics, the range of tools and different technologies available to businesses are constantly evolving. Maintaining, managing and updating information technology (IT) is a vital…

Read More

Avatar photo

Apple Mac IT Support Services A Comprehensive Guide

Apple Mac IT Support Services: A Comprehensive Guide

Within the IT industry, one of the most divisive questions is Apple or Microsoft Windows. When it comes to IT support, there is often a lack of expertise surrounding Apple products. Very few third-party providers are willing to work with companies that use Apple products as it can be challenging. However, Apple products have become…

Read More

Avatar photo

it support los angeles

Enhancing Business Efficiency: A Comprehensive Guide to IT Network Services in London

For modern businesses, a robust IT network is the backbone of operational efficiency and growth. The effective integration of cutting-edge technology into daily operations is essential for staying competitive and meeting customer expectations. As a global business hub, operating a business in London demands exceptional IT network services to keep pace with technological advancements. With…

Read More

Avatar photo

Microsoft aligns pricing with USD

Microsoft Gold Partner London

We understand the critical role technology plays in modern businesses and the importance of aligning with reliable and accredited IT support providers. As a trusted authority in London’s IT landscape, achieving the coveted Microsoft Gold partnership status signifies Microbyte’s commitment to delivering top-tier services and unparalleled expertise. Microsoft awards this respected accreditation to companies demonstrating…

Read More

Avatar photo